Transcription

1 Community Commission Request for New, Pilot or Revised Degree or Certificate Program A. : Laramie County Community B. Date submitted to WCCC: C. Program 1. Request for: X New Program Pilot Program Revised Program 2. Program Title: Cybersecurity 3. Degree or Certificate to be awarded: Degree: AA AS AAS Other X Certificate 4. Educational Pathway: Energy Construction Hospitality X Technology Health Care other 5. Total number of credit hours: Suggested CIP (Classification of Instructional Program) code (6-digit): Planned semester/year new program will begin: Fall Will any part of this program be provided by non-accredited vendor(s)? YES (Provide details) X NO Will all or part of this program be available to students via online or other distance education technologies? X At the start of the program? Within three years of the start of the program? No Revised by AAC 7/11/12 Page 1

3 E. New course prefixes: 1. Recommended Level of Instruction if the community college is using anew course prefix: X No new prefixes Suggested level of instruction 2. New Course prefixes, numbers and titles have been coordinated: with UW (transfer) X Yes No Not Applicable or WCCC (career technical) Yes No X Not Applicable F. New course descriptions: The following are course descriptions for each new course in the program (include prefix, course number, title, credit hours and description): CSEC/HSEC 2013 Cyber Capstone: Students demonstrate the knowledge and skills they have acquired throughout the Cybersecurity program within a Cyber Range, a controlled virtual environment designed to test student ability to protect systems against cyber attacks under realistic conditions. After completion of the practical portion of the lab, students develop a new policy or procedure to add to current cybersecurity practices. Prerequisites: Instructor Consent. Cross listed as CSEC 2013 CSEC/HSEC 1500 Network Security Fundamentals: This course is designed to give students a fundamental understanding of computer and network security. It will introduce students to a wide variety of concepts related to computer security. This course will help prepare the student for the CompTIA Security + Certification. Prerequisite: Concurrent enrollment in or completion of: CSCO CSEC/HSEC 1510 Network Defense Principles: This course provides students and professionals with hands-on introductory experience installing firewalls and intrusion detection systems. This course gives students a solid foundation in advanced network security fundamentals, incorporating examination of intrusion detection, network address translation, packet filtering, proxy servers, firewalls, and virtual private networks. Course content includes network defense fundamentals, risk analysis, security policy implementation, network traffic signatures, virtual private network concepts, VPN implementation, intrusion detection system concepts, incident response, choosing and designing firewalls, firewall topology, strengthening and managing firewalls, and strengthening defense through ongoing management. Prerequisite: Concurrent enrollment in or completion of: CSCO Revised by AAC 7/11/12 Page 3

4 CSEC/HSEC 1520 Network Attack Principles: This course will immerse students in interactive lab environments to learn how to scan, test, hack, and secure systems. Students will gain insight into perimeter defenses and attacker tactics, as well as Intrusion Detection, Policy Creation, Social Engineering, DDoS Attacks, Buffer Overflows, and Virus Creation. This course will help prepare the student for the EC-Council Certified Ethical Hacker (CEH) Certification. Prerequisite: Concurrent enrollment in or completion of: CSCO CSEC/HSEC 1530 Computer Forensics: This course will offer students a detailed methodological approach to computer forensics and evidence analysis. Students will learn the skills necessary to acquire and handle digital evidence, identify and track cybercriminals, and complete computer investigations. This course will help prepare the student for the EC-Council Certified Hacking Forensic Investigator (CHFI) Certification. Prerequisite: Concurrent enrollment in or completion of: CSCO G. Can this program be delivered by current faculty? If not, what are the plans, budget and timeline for bringing on needed instructors? Yes, all but one course is already offered at LCCC. H. Summary of input from and coordination with citizens, business and industry or k-12 education: We have worked with the Office of Homeland Security, the Federal Emergency Management Agency (FEMA), Cheyenne Police Department, Laramie County Sheriff s Office, the Department of Homeland Security (DHS), and EchoStar to develop this degree plan to meet both immediate job openings and the expected future growth of this field. EchoStar has provided a letter that accompanies this form that speaks to the degree plan and how it will assist them in their hiring needs. Also attached is a letter from FEMA to WOHS stating that if this degree is developed under the Homeland Security Program that the current FEMA Grant for tuition assistance can be used for this new degree and certificate. I. Resources required to start and sustain the program and the current plan to meet those resource needs through college or other external funds: As stated earlier this degree plan is made up of existing course with the exception of the Cyber Capstone. This course will be developed Revised by AAC 7/11/12 Page 4

6 Other wage information or comments that would assist the Commission: 3. Primary student audience identified for this program: The primary audience for this degree and certificate will be professionals looking to retrain into cybersecurity from other IT professions, along with those looking for a new career. 4. Anticipated enrollment in the three academic years after WCCC approval (unduplicated headcount) with the basis for the estimate: 10 Year One 15 Year Two 20 Year Three This is based off the current growth seen within this field along with the input received from various government agencies and local and national employers. K. Student recruitment and program marketing strategies to attract the broadest range of individuals for this particular program: This program will attract students as it will be only the second one in the nation and the first in the academic world to offer a kinetic cyber world for students to validate their skills in the Cyber Capstone course. This world will be built around a scale model of a town with all the cyber pieces that are found in the real world. This will include railroad, air traffic control, public utilities, 911 dispatching, banking, a data center, and cellular. Revised by AAC 7/11/12 Page 6

7 L. Identification of similar programs at Community s and an overview of results of discussions with faculty and administrators at the relevant colleges regarding curriculum and possible joint projects: Community Programs (Identify title, degree/certificate and number of credit hours) Casper Central Eastern Laramie County Community Northwest Northern Community District Western Community AAS and AS in Computer Security, 64 Credit Hours N/A N/A Currently Developing N/A N/A N/A M. Note available program and course articulations with other likely transfer institutions in the region, particularly for transfer AA and AS programs. (Note regional Bachelor of Applied Science transfer options in addition to UW.) Currently, there is interest from Excelsior in an articulation agreement if we develop this degree plan. N. When appropriate, note partnerships with business, industry, associations or agencies that have contributed to the design of the proposed program and/or who will contribute to the delivery of the program. Department of Homeland Security (DHS) Federal Emergency Management Agency (FEMA) CyberWatch West Office of Homeland Security (WOHS) Laramie County Emergency Management Laramie County Sheriff s Office Revised by AAC 7/11/12 Page 7

8 Cheyenne Police Department EchoStar O. Assessment of student learning and completer follow-up per performance indicators. How will the assessment outcomes be used to assure student learning and improve the program? Students will be able to: The cyber world is constantly changing and only through the use of student and local employer feedback can we provide a successful degree and certificate. When deficiencies within this program are noted we will evaluate our academic plans and MCORs to find the best way to improve the presented course work and material. P. Other program information or comments that would assist the commission in making a decision using the Guidelines for Use of this Evaluation Tool found in Appendix A of the 2010 WCCC Statewide Strategic Plan. This program addresses and regional interests in the following ways: EDUCATED CITIZENTRY Through this program, students may earn either a certificate or associates degree, thus increasing the number of postsecondary education certificates and degrees in. With the increasing integration with the cyberworld, we will have local, knowledgeable professionals able to secure information and systems which, in turn, will benefit the state and its citizens as a whole. DIVERSIFIED ECONOMY This program helps build the technical skills required to support the changing world of cyber security. Because most businesses and government entities are thoroughly integrated with the cyberworld, professionals educated in the security of all types of information and systems are vital to all aspects of the economy. This makes cyber security professionals relevant across all industries. WORKFORCE DEVELOPMENT This program is designed to create an entry-level professional, as well as enhance current professionals needs. Because the cyberworld is constantly changing and cyber security practices are always developing, creating opportunities for educational development is crucial and will be provided through this program. EFFICIENT SYSTEMS During this degree program, students will have the opportunity to obtain numerous IT certifications. This will allow students to Revised by AAC 7/11/12 Page 8

9 further their cyber security education in a variety of ways. Also, we are currently trying to develop articulation agreements to create a seamless educational path to a four year institution. ACCOUNTABILITY and IMPROVEMENT This program utilizes its community partners to create an up-to-date program that is immediately relevant to current industry needs. It is with these partners that the program is reexamined at least twice a year so as to be competitive, relevant, and accountable to assure students receive a tailored education suited to today s needs, both locally and nationally. OTHER CRITERIA- Labor Needs Curriculum Development Pathways Faculty Support Recruitment Strategies Resource Needs Revised by AAC 7/11/12 Page 9

10 SIGNATURE PAGE Submitted by V. P. for Academic Affairs* Signature Date Printed Name Title Approved by the WCC Academic Affairs Council Signature Date Printed Name Title Approved by Program Review Committee Signature Date Printed Name Title Revised by AAC 7/11/12 Page 10

11 *Signature by the Community Vice President for Academic Affairs verifies that institutional curriculum approval processes have been completed and that the Community Board of Trustees has approved this program request as per institutional policy. Revised by AAC 7/11/12 Page 11

Wyoming Community College Commission Request for New, Pilot or Revised Degree or Certificate Program A. College: Laramie County Community College B. Date submitted to WCCC: C. Program 1. Request for: X

Wyoming Community College Commission Request for New, Pilot or Revised Degree or Certificate Program A. College: Laramie County Community College B. Date submitted to WCCC: C. Program 1. Request for: X

Wyoming Community College Commission Request for New, Pilot or Revised Degree or Certificate Program A. College: Laramie County Community College B. Date submitted to WCCC: C. Program 1. Request for: X

MEETING THE NATION S INFORMATION SECURITY CHALLENGES TO ADDRESS SKILLS AND WORKFORCE SHORTAGES IN THE INFORMATION SECURITY INDUSTRY, THE NATIONAL SECURITY AGENCY AND THE DEPARTMENT OF HOMELAND SECURITY

TURNING THE RISING TIDE OF CYBERSECURITY THREATS With cyber attacks on the rise, there s a growing need for digital forensic professionals with the knowledge and skills to investigate technology crimes

Cybersecurity AAS Program New Program Proposal State Submission Steve Buchholz, Dean of Accreditation and Advancement July 2015 TABLE OF CONTENTS Executive Summary... 2 Identification and Description of

1 2 What is EC-Council Certified Security Analyst Licensed Penetration Tester Program You are an ethical hacker. Your last name is Pwned. You dream about enumeration and you can scan networks in your sleep.

1 2 What is EC-Council Certified Security Analyst Licensed Penetration Tester Program You are an ethical hacker. Your last name is Pwned. You dream about enumeration and you can scan networks in your sleep.

Anne Arundel Community College Tracks Anne Arundel Community College s computer technologies courses have been organized into 10 suggested tracks. The tracks are arranged to ensure that students have the

167 th Air Wing Fast Track Cyber Program Blue Ridge Community and Technical College Information Security Certificate: Designed to introduce students to programming, security basics, network monitoring,

OVERVIEW DEGREES & CERTIFICATES 015 The best. Made better. SANS graduate programs are the ultimate expression of our 25 years dedicated to the education and development of information security professionals.

Introducing Maryville University s CYBER SECURITY ONLINE PROGRAMS Bachelor of Science in Cyber Security & Master of Science in Cyber Security The cyber security industry is calling for more experts. And

IT Security Training Why Security Certification? A Serious Business - Fear Drives the Demand High Demand Freedom to Make and Break Rules Benefits of Certification Provides Assurance to Employers Certification

Flexible Online Bachelor s Degree Completion Programs Bachelor of Science Degree Cyber Security Advancing the nation s workforce one graduate at a time Cyber Security Major The Program You ve heard about

An Accelerated Pathway to Careers in Cybersecurity for Transitioning Veterans NICE Annual Conference November 2015 Panelists David Brown, Director of CyberTalent at the SANS Institute, a new business unit

Criminal Justice Program Expansion State Submission Mark Wilson, President January 2014 TABLE OF CONTENTS Executive Summary... 2 Identification and Description of the Program... 2 Objectives and Purpose

The SANS Technology Institute makes shorter groups of courses available to students who are unable to commit to a full master s degree program. These certificate programs will augment your skills, provide

Career and Technical Education 2015 Annual Report November 2015 Career and Technical Education (CTE) is a key ingredient to meet the needs of Utah s economy. Utah System of Higher Education (USHE) institutions

Item 1. Program Goals and Objectives The Applications Security Associate of Science Degree Program will allow students to design secure applications and services to protect critical assets, develop, test,

Cyber threats are growing. So are your career opportunities. Put the future of your cybersecurity career in the hands of a respected online education leader. Everything you need to succeed. Excelsior College

Anne Arundel Community College is an academic partner in the Pathways to Cybersecurity Careers Consortium in the State of Maryland. The Pathways to Cybersecurity Consortium consists of workforce, academic,

National Cyber League Certified Ethical Hacker (CEH) TM Syllabus Note to Faculty This NCL Syllabus is intended as a supplement to courses that are based on the EC- Council Certified Ethical Hacker TM (CEHv8)

Education for the future. The six schools of study at the ITT Technical Institutes 3 (School of Information Technology, School of Electronics Technology, School of Drafting and Design, School of Business,

USING INFORMATION ASSURANCE CURRICULUM STANDARDS AS A BASIS FOR A GRADUATE DEGREE N. Paul Schembari, Mike Jochen East Stroudsburg University of Pennsylvania {nschembari, mjochen}@esu.edu ABSTRACT We describe

FedVTE Training Catalog SPRING 2015 advance. Free cybersecurity training for government personnel. fedvte.usalearning.gov If you need any assistance please contact the FedVTE Help Desk here or email the

BAY AREA COMMUNITY COLLEGE CONSORTIUM REQUEST FOR PROGRAM ENDORSEMENT - NEW CREDIT PROGRAM Complete (maximum 3 pages) and Email this document to: baccc@cabrillo.edu CC: Rock Pfotenhauer, Chair, Bay Area

FALL 2015 Access FedVTE online at: fedvte.usalearning.gov If you need any assistance please contact the FedVTE Help Desk her e or email the Help Desk at support@usalearning.net. To speak with a Help Desk

ECSA 1 EC-Council Certified Security Analyst Duration : What is EC-Council Certified Security Analyst Licensed Penetration Tester Program You are an ethical hacker. Your last name is Pwned. You dream about

National Cyber League Certified Ethical Hacker (CEH) TM Syllabus Note to Faculty This NCL Syllabus is intended as a supplement to courses that are based on the EC- Council Certified Ethical Hacker TM (CEHv8)

COMPUTER AND INTERNETWORKING TECHNOLOGIES COMPUTER AND INTERNETWORKING TECHNOLOGIES These days it s almost impossible to find any area of life not impacted by technology. As existing and emerging technologies

Education for the Future. The six schools of study at the ITT Technical Institutes 2 (School of Information Technology, School of Electronics Technology, School of Drafting and Design, School of Business,

The fast track to top skills and top jobs in cyber. Guaranteed. FREE TO TRANSITIONING VETERANS FAST TRACK Four steps to a cybersecurity career QUALIFY Earn Acceptance TRAIN Build Elite Skills CERTIFY Earn

Cover/Signature Page Full Template Institution Submitting Request: Utah Valley University Proposed Title: Certificate of Completion in Construction Management School or Division or Location: College of

Priority III: A National Cyberspace Security Awareness and Training Program Everyone who relies on part of cyberspace is encouraged to help secure the part of cyberspace that they can influence or control.

EC-Council Ethical Hacking and Countermeasures Description This class will immerse the students into an interactive environment where they will be shown how to scan, test, hack and secure their own systems.

I. Project Abstract Daytona Beach Community College will launch a new 36-credit Applied Technology Diploma (ATD) program to train 15 to 20 adult students a year to assume entry-level positions as Medical

Cisco Networking Academy: Delaware Profile Educating the Architects of the Networked Economy Now in its second decade, Cisco Networking Academy has provided more than two million students worldwide with

PROPOSAL TO IMPLEMENT A NEW ACADEMIC PROGRAM (Major, Minor, Master s, Dual Degree, or Certificate) New academic programs must be approved by the AAC/Grad Council, Faculty Plenary, VPAA, Board of Trustees,

El Camino College Homeland Security Spring 2016 Courses With over 250,000 federal positions in Homeland Security and associated divisions, students may find good career opportunities in this field. Explore

This handbook describes the process of establishing course-to-course articulation agreements between secondary districts and Riverside Community College District and the process for students to receive

CJ 7/11 Education for the Future. The seven schools of study at the ITT Technical Institutes 4 (School of Information Technology, School of Electronics Technology, School of Drafting and Design, School

September 2011 Master of Accounting University of Washington Tacoma Introduction The University of Washington Tacoma (UWT) proposes to offer a Master of Accounting degree beginning Fall 2012. This self-supporting,

PILOT ASSESSMENT PROJECT FOR 2002-03 April12, 2003 The college selected the following programs and disciplines to be reviewed and establish learning outcomes as part of a pilot project to establish examples

The fast track to top skills and top jobs in cyber. Guaranteed. FREE TO QUALIFYING PARTICIPANTS WELCOME The SANS Institute is presenting the SANS CyberTalent Immersion Academy for Women to encourage women